<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<p><font face="Calibri">As to the validity period of the Random
Value, we believe it should be 30 days as for TLS certs.<br>
</font></p>
<p><font face="Calibri">Adriano</font><br>
</p>
<div class="moz-cite-prefix">Il 15/02/2022 21:49, Stephen Davidson
via Smcwg-public ha scritto:<br>
</div>
<blockquote type="cite"
cite="mid:0100017eff261873-52a62579-9513-413d-8def-1190edf2925b-000000@email.amazonses.com">
<p class="MsoNormal">Dimitris Zacharopoulos questioned why the
Random Value in the 3.2.2.2 method was required to be reset
within 24 hours, noting that this caused issues for users acting
on messages over a weekend or a vacation, or where emails are
delayed in spam filters. Corey Bonnell pointed out that the
equivalent text for random values in the TLS BR was 30 days.
Stephen indicated that it had been taken from the NIST 800-63
standard. Fotis Loukos mentioned that current best practice was
for a “timed out” user to generate a new random value. It was
suggested that a compromise time span of a week might be found,
or that the timing issue might also be addressed within the TLS
BR.<o:p></o:p></p>
</blockquote>
</body>
</html>